× Cookie が無効になっています。 このサイトを正しく動作させるには、Cookie を有効にする必要があります
SHA256: 12189752a38abbbbab80aa4519c21c0e5d7b083c0732d9b68991d1eb016ce2bf
ファイル名: uninstall_flash_player.exe
検出率: 0 / 70
分析日時: 2019-03-12 13:37:42 UTC (2 ヶ月, 1 週間前) 最新を表示
ウイルス対策ソフト 結果 更新日
Acronis 20190222
Ad-Aware 20190312
AegisLab 20190312
AhnLab-V3 20190312
Alibaba 20190306
ALYac 20190312
Antiy-AVL 20190312
Arcabit 20190312
Avast 20190312
Avast-Mobile 20190312
AVG 20190312
Avira (no cloud) 20190312
Babable 20180918
Baidu 20190306
BitDefender 20190312
Bkav 20190312
CAT-QuickHeal 20190312
ClamAV 20190312
CMC 20190312
Comodo 20190312
CrowdStrike Falcon (ML) 20190212
Cybereason 20190109
Cylance 20190312
Cyren 20190312
DrWeb 20190312
eGambit 20190312
Emsisoft 20190312
Endgame 20190215
ESET-NOD32 20190312
F-Prot 20190312
F-Secure 20190312
Fortinet 20190312
GData 20190312
Ikarus 20190312
Sophos ML 20181128
Jiangmin 20190312
K7AntiVirus 20190312
K7GW 20190312
Kaspersky 20190312
Kingsoft 20190312
Malwarebytes 20190312
MAX 20190312
McAfee 20190312
McAfee-GW-Edition 20190312
Microsoft 20190312
eScan 20190312
NANO-Antivirus 20190312
Palo Alto Networks (Known Signatures) 20190312
Panda 20190311
Qihoo-360 20190312
Rising 20190312
SentinelOne (Static ML) 20190311
Sophos AV 20190312
SUPERAntiSpyware 20190307
Symantec 20190311
Symantec Mobile Insight 20190220
TACHYON 20190312
Tencent 20190312
TheHacker 20190308
TotalDefense 20190312
Trapmine 20190301
TrendMicro 20190312
TrendMicro-HouseCall 20190312
Trustlook 20190312
VBA32 20190312
ViRobot 20190312
Webroot 20190312
Yandex 20190310
Zillya 20190311
ZoneAlarm by Check Point 20190312
Zoner 20190312
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 1996-2019 Adobe Systems Incorporated

Product Adobe® Flash® Player Installer/Uninstaller
Original name FlashUtil.exe
Internal name Adobe® Flash® Player Installer/Uninstaller 32.0
File version 32,0,0,156
Description Adobe® Flash® Player Installer/Uninstaller 32.0 r0
Signature verification Signed file, verified signature
Signing date 1:07 AM 2/26/2019
Signers
[+] Adobe Systems Incorporated
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer DigiCert EV Code Signing CA (SHA2)
Valid from 01:00 AM 03/15/2017
Valid to 01:00 PM 03/20/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 2E419CCC647F94FE0DFC5460D0740B93D3572E54
Serial number 06 F0 47 88 03 10 55 D3 1D EF FE FC D0 26 D6 C5
[+] DigiCert EV Code Signing CA (SHA2)
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 12:00 PM 04/18/2012
Valid to 12:00 PM 04/18/2027
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 60EE3FC53D4BDFD1697AE5BEAE1CAB1C0F3AD4E3
Serial number 03 F1 B4 E1 5F 3A 82 F1 14 96 78 B3 D7 D8 47 5C
[+] DigiCert
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 01:00 AM 11/10/2006
Valid to 01:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
Serial number 02 AC 5C 26 6A 0B 40 9B 8F 0B 79 F2 AE 46 25 77
Counter signers
[+] Symantec SHA256 TimeStamping Signer - G2
Status Valid
Issuer Symantec SHA256 TimeStamping CA
Valid from 01:00 AM 01/02/2017
Valid to 11:59 PM 04/01/2028
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 625AEC3AE4EDA1D169C4EE909E85B3BBC61076D3
Serial number 54 58 F2 AA D7 41 D6 44 BC 84 A9 7B A0 96 52 E6
[+] Symantec SHA256 TimeStamping CA
Status Valid
Issuer VeriSign Universal Root Certification Authority
Valid from 01:00 AM 01/12/2016
Valid to 12:59 AM 01/12/2031
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 6FC9EDB5E00AB64151C1CDFCAC74AD2C7B7E3BE4
Serial number 7B 05 B1 D4 49 68 51 44 F7 C9 89 D2 9C 19 9D 12
[+] VeriSign Universal Root Certification Authority
Status Valid
Issuer VeriSign Universal Root Certification Authority
Valid from 12:00 AM 04/02/2008
Valid to 12:59 AM 12/02/2037
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha256RSA
Thumbrint 3679CA35668772304D30A5FB873B0FA77BB70D54
Serial number 40 1A C4 64 21 B3 13 21 03 0E BB E4 12 1A C5 1D
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-25 22:34:40
Entry Point 0x00028148
Number of sections 6
PE sections
Overlays
MD5 9dd81a92854889ecf6c16a3ba27c2136
File type data
Offset 1449984
Size 7680
Entropy 7.26
PE imports
RegCreateKeyExW
CloseServiceHandle
RegDeleteValueW
CryptReleaseContext
RegCloseKey
RegSetValueExW
FreeSid
CryptGetHashParam
RegQueryValueExA
OpenSCManagerW
RegEnumKeyExW
RegOpenKeyExW
CheckTokenMembership
OpenServiceW
RegSetValueExA
ControlService
AllocateAndInitializeSid
RegOpenKeyExA
CryptHashData
RegQueryValueExW
DeleteDC
SetBkMode
CreateFontA
BitBlt
CreateCompatibleBitmap
GetTextExtentExPointW
CreateSolidBrush
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
StretchBlt
SetTextColor
SetThreadLocale
GetStdHandle
ReleaseMutex
WaitForSingleObject
FindNextFileA
EncodePointer
QueueUserAPC
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
LocalFree
OutputDebugStringW
FindClose
InterlockedDecrement
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
TlsGetValue
CopyFileW
LoadResource
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
GetFileAttributesW
RaiseException
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GlobalAddAtomW
CreateThread
MoveFileExW
GetSystemDirectoryW
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
ReadConsoleW
SetWaitableTimer
LeaveCriticalSection
WriteConsoleW
CreateToolhelp32Snapshot
GetSystemWow64DirectoryW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetOEMCP
QueryPerformanceCounter
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
ExitThread
FreeLibrary
GetFileSize
OpenProcess
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
CreateWaitableTimerW
GetFileSizeEx
RemoveDirectoryW
FindFirstFileExA
FindNextFileW
GetCurrentThreadId
FindFirstFileW
DuplicateHandle
CreateFileW
GetFileType
TlsSetValue
ExitProcess
InterlockedIncrement
GetLastError
SystemTimeToFileTime
LCMapStringW
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
Process32NextW
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
Process32FirstW
SetEndOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
SetDllDirectoryW
GetACP
GetModuleHandleW
FreeResource
IsValidCodePage
FindResourceW
CreateProcessW
Sleep
FindResourceA
SysFreeString
VariantInit
VariantClear
SysAllocString
SHGetFolderPathW
SHFileOperationW
ShellExecuteW
ShellExecuteExW
Ord(680)
CommandLineToArgvW
MapWindowPoints
RegisterClassExW
GetForegroundWindow
GetParent
GetPropW
BeginPaint
GetMessageW
DefWindowProcW
MoveWindow
PostQuitMessage
ShowWindow
SetPropW
SetWindowLongW
MessageBoxW
GetWindowRect
EndPaint
SetCapture
ReleaseCapture
SetWindowPos
TranslateMessage
GetWindow
PostMessageW
GetDC
GetKeyState
ReleaseDC
LoadStringW
SetWindowTextW
DrawTextW
DispatchMessageW
ClientToScreen
SetRect
InvalidateRect
SetTimer
CallWindowProcW
FillRect
GetClientRect
LoadCursorW
CreateWindowExW
GetWindowLongW
SetForegroundWindow
DestroyWindow
SetCursor
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeSecurity
StringFromGUID2
Number of PE resources by type
RT_STRING 112
RT_ICON 7
RT_RCDATA 3
LZMG 1
TYPELIB 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 11
ENGLISH CAN 8
TURKISH DEFAULT 7
SWEDISH NEUTRAL 7
GERMAN 7
CHINESE TRADITIONAL 7
CZECH DEFAULT 7
JAPANESE DEFAULT 7
FRENCH 7
CHINESE SIMPLIFIED 7
PORTUGUESE BRAZILIAN 7
SPANISH MODERN 7
POLISH DEFAULT 7
DUTCH 7
RUSSIAN 7
KOREAN 7
ITALIAN 7
NEUTRAL 3
PE resources
Debug information
ExifTool file metadata
CodeSize
274944

SubsystemVersion
5.1

LinkerVersion
14.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
32.0.0.156

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Adobe Flash Player Installer/Uninstaller 32.0 r0

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
1174016

EntryPoint
0x28148

OriginalFileName
FlashUtil.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 1996-2019 Adobe Systems Incorporated

FileVersion
32,0,0,156

TimeStamp
2019:02:25 23:34:40+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Adobe Flash Player Installer/Uninstaller 32.0

ProductVersion
32,0,0,156

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Adobe Systems Incorporated

LegalTrademarks
Adobe Flash Player

ProductName
Adobe Flash Player Installer/Uninstaller

ProductVersionNumber
32.0.0.156

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 dc35816691e22b787ec9efce963f2889
SHA1 cd01fbc6a11192f978ed35b5c3d4c40a40ab7535
SHA256 12189752a38abbbbab80aa4519c21c0e5d7b083c0732d9b68991d1eb016ce2bf
ssdeep
24576:EKJ7ojuhPWZ5TckKKVmq3s8M89b5rkP4N9R+Ns/2Pjb3Oz:EMph05Tzxmq3RkPs9sNt36

authentihash b3af1c7a6b9598d524d6902dc7bd28d8a6d083598ac3036b97c69191f4da1c8d
imphash 2ec68c558a5f724af82fd6229781023b
File size 1.4 MB ( 1457664 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2019-03-12 03:55:58 UTC (2 ヶ月, 1 週間前)
Last submission 2019-03-13 00:18:09 UTC (2 ヶ月, 1 週間前)
ファイル名 uninstall.exe
Adobe Flash Player Uninstaller 32.0.0.156.exe
FlashUtil.exe
Uninstall.exe
Uninstall.exe
uninstall_flash_player.exe
Uninstaller 32.0
uninstall_flash_player.exe
uninstall.exe
Uninstall.exe
コメントはありません. この項目について、VirusTotal コミュニティのメンバーはまだ誰もコメントしていません。是非、コメントしてください。

コメントを投稿してください...

?
コメントを投稿

サインインしていません。登録ユーザーのみがコメントを投稿できます。サインインして意見をお聞かせください。

投票はありません. この項目に対してまだ誰も投票していません。是非、投票してください。
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Shell commands
Created mutexes
Opened mutexes
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.